Ask Question, Ask an Expert


Ask Electrical & Electronics Expert

1) describe the data needed for estimating the regulation of alternator by the potier method. Describe how regulation is determined for different power factor.

2) Determine the synchronous impedance and reactance of an alternator where the given field current generates an armature current of 200 A on short circuit and a generated E.M.F of 50 V on open circuit. The armature resistance is 0.1 ohm. To what induced voltage should the alternator be excited if it is to deliver the load of 100 A at a pf of 0.8 lagging, with a terminal voltage of 200 V.

3) Describe the effect of varying the excitation upon the armature current and power factor of the synchronous motor for a constant output with the help of phasor diagram.

4) a) A 500, 1 Phase synchronous motor provides a net output mechanical power of 7.46 KW and operates at the 0.9 pf lagging. Its effective resistance is 0.8 ohm. If iron and friction losses are 500 W and excitation losses are 800 W, determine the armature current. Find the commercial efficiency.

b) A 75 KW,3 phase star connected ,50 Hz , 440v cylindrical rotor synchronous motor operates at rated condition with 0.8 pf leading. The motor efficiency excluding field and stator losses, is 95% and Xs =2.5 ohm. Find:

i) Mechanical power developed

ii) Armature current

iii) Back e.m.f

iv) Power angle

v) Maximum or pull out torque of the motor.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M913269

Have any Question? 

Related Questions in Electrical & Electronics

1 how would you use amperes circuital law in differential

1. How would you use Ampere's circuital law in differential form to find the magnetic field adjacent to the current sheet? 2. If the current density on the infinite plane current sheet of Figure 4.2 were directed in the ...

1 are both ah and esp needed for ip security why or why

1. Are both AH and ESP needed for IP security? Why or why not? 2. What are the two protocols discussed in this chapter that provide security at the transport layer? 3. What is IKE? What is its role in IPSec? 4. What is t ...

Assignmentbefore you start please read the following

Assignment Before you start please read the following instructions carefully. 1. This assignment forms part of the formal assessment for this module. If you fail to reach the required standard for the assignment then you ...

1 assume alice needs to send an e-mail to bob explain how

1. Assume Alice needs to send an e-mail to Bob. Explain how the confidentiality of the e-mail is achieved using S/MIME. 2. When we talk about authentication in SSL, do we mean message authentication or entity authenticat ...

1 discuss briefly the application of gauss law for the

1. Discuss briefly the application of Gauss' law for the electric field to determine the electric field due to charge distributions. 2. State Gauss' law for the magnetic field. How is it derived from Faraday's law? 3. Wh ...

Suppose that a discrete-time system is specified by the

Suppose that a discrete-time system is specified by the transfer function Compute and plot a. The step response of the system b. The impulse response of the system c. The response of the system to the input signal

1 show the outline of a routing table for pastry with

1. Show the outline of a routing table for Pastry with address space of 16 and b = 2. Give some possible entries for each cell in the routing table of Node N21. 2. In a Pastry network using DHT, in which m = 4 and b = 2, ...

A sketch x omega the amplitude spectrum of a signal x t 3

a. Sketch |X (ω)|, the amplitude spectrum of a signal x (t) = 3 cos 6πt + sin 18πt + 2 cos(28 - ∉)πt, where ∉ is a very small number → 0. Determine the minimum sampling rate required to be able to reconstruct x (t) from ...

1 if alice and bob need to communicate using asymmetric-key

1. If Alice and Bob need to communicate using asymmetric-key cryptography, how many keys do they need? Who needs to create these keys? 2. Why do you think asymmetric-key cryptography is used only with small messages. 3. ...

1 define the parts of flow specification in intserv2

1. Define the parts of flow specification in IntServ. 2. Distinguish between guaranteed services and controlled-load services in IntServ. 3. IntServ is normally called a destination-based service. Explain the reason. 4. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro